Vulnerability Description
Untrusted search path vulnerability in libtunepimp-perl 0.4.2-1 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the tunepimp.so module, which might allow local users to gain privileges by installing malicious libraries in that directory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 3.1 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359241ExploitPatch
- http://www.securityfocus.com/bid/17288ExploitPatch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25682
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359241ExploitPatch
- http://www.securityfocus.com/bid/17288ExploitPatch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25682
FAQ
What is CVE-2006-1566?
CVE-2006-1566 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Untrusted search path vulnerability in libtunepimp-perl 0.4.2-1 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the tunepimp.so module, which might allow local users to...
How severe is CVE-2006-1566?
CVE-2006-1566 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1566?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux.